CLEAN-SLATE DESIGN OF RESILIENT, ADAPTIVE, SECURE HOSTS (CRASH)Exploitable vulnerabilities originate from a handful of known sources (e.g., memory safety); they remain because of deficits in tools, languages and hardware that could address and prevent vulnerabilities at the design, implementation and execution stages. Often, making a small change in one of these stages can greatly ease the task in another. The CRASH program will encourage such cross layer co-design and participation from researchers in any relevant area.Defense Advanced Research Projects AgencyDARPA_46ad30a4-ad5d-11df-9c96-10167a64ea2aComputer Tool ResearchersComputer Language ResearchersComputer Hardware Researchers_794cd9ce-08ac-11e5-8b78-349ade3234daTo encourage innovative, cross-layer participation the co-design of new computer systems_794cda6e-08ac-11e5-8b78-349ade3234daResistanceResist cyber-attacks._794cdaf0-08ac-11e5-8b78-349ade3234da1_794cdb86-08ac-11e5-8b78-349ade3234daAdaptationAdapt after a successful attack to continue rendering useful services._794cdbfe-08ac-11e5-8b78-349ade3234da2_794cdc76-08ac-11e5-8b78-349ade3234daLearningLearn from previous attacks._794cdcf8-08ac-11e5-8b78-349ade3234da3_794cdd70-08ac-11e5-8b78-349ade3234daPrevention & CopingGuard against and cope with future attacks._794cdde8-08ac-11e5-8b78-349ade3234da4_794cde60-08ac-11e5-8b78-349ade3234daSelf-RepairRepair after attacks have succeeded._794cded8-08ac-11e5-8b78-349ade3234da5_794cdf64-08ac-11e5-8b78-349ade3234da2015-06-01http://www.darpa.mil/Our_Work/I2O/Programs/Clean-slate_design_of_Resilient_Adaptive_Secure_Hosts_%28CRASH%29.aspxOwenAmburOwen.Ambur@verizon.net